Malcovery® Security, the leader in delivering actionable intelligence that can be applied to neutralize email-based threats such as phishing, spam and malware, today announced the release of a new version of Today’s Top Threats (T3) product that supports emerging industry standard STIX (Structured Threat Information eXpression), a standard, machine-readable language that organizations can use to efficiently incorporate the latest threat information into their security infrastructures. All of the same rich threat intelligence information currently available in T3's XML format from the Malcovery T3 product is also available from Malcovery in STIX format.

By announcing and delivering support, Malcovery joins FS-ISAC, the Department of Homeland Security (DHS), US-CERT, Mitre, and Japan's Information-technology Promotion Agency, and Microsoft who have all publicly committed to adopting STIX.

Malcovery delivers Today’s Top Threats (T3), threat analysis throughout the day and informs enterprises of emerging cybersecurity threats found in spam email messages. T3 is based on the fact that the most dangerous malicious threats are successfully arriving in email inboxes before the majority of anti-virus solutions have provided protection against them. As a result, tens of thousands of computers and mobile devices are infected every day. Malcovery’s T3 solution provides actionable intelligence which can be applied to help protect your network from these threats.

Malcovery delivers Today’s Top Threats (T3) is based on the fact that the most dangerous malicious threats are successfully arriving in email inboxes before the majority of anti-virus solutions have provided protection against them. As a result, tens of thousands of computers and mobile devices are infected every day. Malcovery’s T3 solution provides actionable intelligence throughout the day, which can be applied to help protect your network from these threats. Information provided by Malcovery’s T3 product includes: a) spam campaign subject line(s), b) attacked brands, c) hostile URL’s, d) hostile file analysis along with a number of other indicators of compromise. Once only available from Malcovery in XML form, this same actionable information is available in STIX format.

"T3 threat intelligence information is being used daily by our customers—including major financial, retail, social media organizations—to effectively prevent and stop malicious spam, " stated Gary Warner, Chief Technology Officer & Co-Founder of Malcovery. "STIX support makes that information even more usable and consumable. STIX makes it so when you share threat intelligence, it's always in machine-readable format.”

Malcovery continues to experience rapid growth, which has been fueled by new customers adoption such as LinkedIn, IBM, Citi, eBay, Facebook, VISA, Assurant, Four Rivers Software, and others. A key factor that has contributed to the high rate of new customer acquisition has been the Malcovery capability to identify the source and nature of cyberthreats, versus current anti-phishing solutions which focus on security ‘symptoms,’ leaving customers playing ‘whac-a-mole’ vs. cybercriminals.

The Malcovery T3 cyber threat identification service has been recognized independently for its ability to detect threats days ahead of other solutions and for its detection coverage and effectiveness when compared to antivirus offerings. Krebs on Security, a blog authored by noted security reporter Brian Krebs, reviewed the T3 reports in June and July of 2012. Krebs described the effectiveness of current antivirus solutions when compared to T3: “The one detail most readers will probably focus on most in this report is the atrociously low detection rate for these spammed malware samples. On average, antivirus software detected these threats about 22 percent of the time on the first day they were sent and scanned at virustotal.com. If we take the median score, the detection rate falls to just 17 percent. That’s actually down from last month’s average and median detection rates, 24.47 percent and 19 percent, respectively.” See http://krebsonsecurity.com/2012/06/a-closer-look-recent-email-based-malware-attacks/ and http://krebsonsecurity.com/tag/university-of-alabama-at-birmingham/.

Malcovery was launched in early 2013 as a result of an exclusive worldwide license with the University of Alabama at Birmingham (UAB) and based on research conducted at the UAB Center for Information Assurance and Joint Forensics Research (CIA|JFR). The company has quickly gained commercial success with enterprise customers such as eBay, Facebook, IBM, VISA, Citi, Assurant, Regions, and LinkedIn. Key partners and resellers include IBM, Agari, Wombat Security, Internet Identity (IID), PPMA, GuardSight, Core Support, Bishop Technologies and ReSoft International.

About Malcovery® Security

Malcovery Security is the leading provider of actionable cyber security intelligence and forensic analysis about email-based threats (phishing, spam and malware), delivered through software and services, that identifies, prioritizes and targets cybercriminal activities and provides effective countermeasures.

Unlike services that serve only as a reactive response to these attacks today—services that simply address the symptoms but cannot provide the intelligence to actually stop the cybercriminal and their activities—Malcovery Security’s solutions provide the unique intelligence required to respond effectively to attacks on customers’ brands, to disrupt email-based threats on an organization.

Editor’s Note: Malcovery® is a registered trademark. ‘Identify the Source. Stop the Threat.’ TM is a trademark of Malcovery Security, LLC. All other trademarks mentioned herein are the protected properties of their respective owners.